Technology and Business Law Blog

Password Security

Getting hands on personal information leading to breach of identity and security issues is the hottest methodology of criminals. Thanks to the Internet, as I had earlier mentioned there is tons of information just available to just about anybody about just about anybody (that is right) and so ease of availability leads hackers and others to get their hand on it.  This can be done by being anywhere in the world and access other people’s information again anywhere in the world. It surely is a world without borders since the web servers can be hosted anywhere in the world. This is exactly what happened at Monster.com were details of 1.3 million job seekers were stolen.

Hackers broke into the U.S. on-line recruitment site’s password-protected resume library using credentials that Monster Worldwide said were stolen from its clients, in one of the biggest Internet security breaches in recent memory. Talking about password protection, a 23 year old convicted computer hacker states that it hacking into corporate computers is the easiest thing to do- “so easy that a caveman could do it.” Read this. The main reason stated by him is that the computers were insecure with default passwords and once he had the default password then “we’d have all sorts of information, basically the whole database, right at our fingertips.”

Keith Rhodes, chief technologist at the U.S. Government Accountability Office, said “Default passwords are a silly problem,” said Rhodes, who is widely considered to be the federal government’s top hacker. “But they were able to take a silly flaw and turn it into a business. … It disappoints me, but I’m not surprised.”

Password security is real important even with our personal computers and one has to take the time to set up a unique password that is not generic and change it often especially if on-line accounts are used and financial transactions are being conducted.

Advertisements

September 26, 2007 - Posted by | Computer hacking, passwords, Security

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: